Sorry, but I have to clarify one thing in my below message: The major
issue caused the latest OpenSSL upgrade was not due to the anything inside
the RSA implementation, but was in (the CBC mode of) some specified
symmetric encryption phase after SSL handshake.
Sorry if any confusion.
--
Regards
Thanks for your response, Rich.
Yes, I'm aware of timing attack against RSA cryptography (e.g. the one
majorly responded for the latest upgrade), but this patch is simply a small
optimization for RSA testing code, which is only used in the testsuit of
OpenSSL, and has no any effect on the real usa
Thanks for your response, Rich.
Yes, I'm aware of timing attack against RSA cryptography (e.g. the one
majorly responded for the latest upgrade), but this patch is simply a small
optimization for RSA testing code, which is only used in the testsuit of
OpenSSL, and has no any effect on the real usa
You might want to read about timing attacks.
--
Principal Security Engineer
Akamai Technology
Cambridge, MA
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Hi there,
In the file crypto/rsa/rsa_test.c, line 308~326, there is a check to ensure
no corrupted data can be decrypted by the RSA implementation. However, in
the loop, when it has already detected an error in current one, it will
still continue the check in all left iterations, which is not nec